| 11.1A Software categories | 11.3.1.1 | justify the choice of applied software and choice criteria based on the goals |
| 11.3.1.2 | classify application software | |
| 11.1A Operating Systems. Types of operating systems | 11.3.1.3 | describe the purpose and main functions of operating systems |
| 11.3.1.4 | compare single-user and multi-user operating systems | |
| 11.3.1.5 | compare one-task and multitasking operating systems | |
| 11.1A Von Neumann architecture | 11.3.2.1 | describe the interaction of CPU with peripheral devices |
| 11.1A System bus | 11.3.2.2 | describe the purpose of CPU components, system bus and main memory |
| 11.1A Main memory | 11.3.4.1 | explain the differences between RAM and ROM memory |
| 11.1A Cache memory. Virtual memory | 11.3.4.3 | explain the purpose of cache memory |
| 11.3.4.2 | explain the purpose of virtual memory | |
| 11.1A Boolean logic. Logic gates. Truth tables | 11.3.3.3 | build truth tables AND, OR, NOT, NAND, NOR, XOR |
| 11.1A Simplifying Boolean expressions | 11.3.3.1 | distinguish between laws of Boolean logic |
| 11.3.3.2 | simplify logical expressions using the laws of Boolean logic |
| 11.1B Classifications and categories of programming languages | 11.5.1.1 | distinguish between generations of programming languages |
| 11.5.1.2 | describe the main categories of programming languages |
| 11.4B Encryption. Authorization | 11.1.2.4 | describe data protection measures such as encryption and access rights to data (authorization) |
| 11.4B Blockchain technology | 11.1.2.6 | explain the function and operation of Blockchain technologies |
| 11.4B Open and closed software | 11.1.3.2 | describe the specifics of open-source software |
| 11.1.3.3 | describe the specifics of closed-source software | |
| 11.4B Copyright | 11.1.3.1 | follow the copyright law when developing applications |
| 11.4B Access restriction | 11.1.3.4 | restrict access to data made available through the Internet using a variety of methods |
| 11.4B Cloud technologies | 11.1.3.5 | evaluate the risks of using cloud technologies |
| 11.4C LAN & WAN | 11.6.1.1 | compare features of local (LAN) and wide-area networks (WAN) |
| 11.4C Network topology | 11.6.1.2 | describe the advantages and disadvantages of network topologies bus, ring, star, mesh |
| 11.4C Network Hardware | 11.6.1.3 | explain the purpose of network equipment |
| 11.4C Client-server model | 11.6.2.3 | know the features of the client-server model |
| 11.4C URL | 11.6.2.1 | describe the role of universal resource locator (URL) |
| 11.4C DNS | 11.6.2.2 | describe the role of Domain Name System (DNS) |